FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WIRED

What Really Happened in the Aftermath of the Lizard Squad Hacks

By: Joe Tidy β€” June 5th 2025 at 10:00
On Christmas Day in 2014 hackers knocked out the Xbox and PlayStation gaming networks, impacting how video game companies handled cybersecurity for years.
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – May 2025 edition

β€” May 30th 2025 at 09:00
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Danabot under the microscope

β€” May 23rd 2025 at 11:43
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
☐ β˜† βœ‡ WeLiveSecurity

Lumma Stealer: Down for the count

β€” May 22nd 2025 at 14:53
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
☐ β˜† βœ‡ WeLiveSecurity

The who, where, and how of APT attacks in Q4 2024–Q1 2025

β€” May 19th 2025 at 17:17
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

Sednit abuses XSS flaws to hit gov't entities, defense companies

β€” May 15th 2025 at 13:15
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
☐ β˜† βœ‡ WeLiveSecurity

How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

β€” May 12th 2025 at 09:00
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
☐ β˜† βœ‡ WeLiveSecurity

RSAC 2025 wrap-up – Week in security with Tony Anscombe

β€” May 2nd 2025 at 14:16
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – April 2025 edition

β€” April 29th 2025 at 11:43
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – March 2025 edition

β€” March 31st 2025 at 10:46
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

RansomHub affiliates linked to rival RaaS gangs

β€” March 27th 2025 at 13:10
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions
☐ β˜† βœ‡ WeLiveSecurity

FamousSparrow resurfaces to spy on targets in the US, Latin America

β€” March 27th 2025 at 10:42
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time
☐ β˜† βœ‡ WeLiveSecurity

MirrorFace updates toolset, expands targeting to Europe

β€” March 18th 2025 at 15:45
The group's Operation AkaiRyΕ« begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure
☐ β˜† βœ‡ WeLiveSecurity

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

β€” March 17th 2025 at 10:00
Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – February 2025 edition

β€” February 26th 2025 at 10:00
Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news
☐ β˜† βœ‡ WeLiveSecurity

Fake job offers target software developers with infostealers

β€” February 20th 2025 at 14:11
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
☐ β˜† βœ‡ WeLiveSecurity

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

β€” February 12th 2025 at 10:00
Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – January 2025 edition

β€” January 30th 2025 at 11:32
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy
☐ β˜† βœ‡ WeLiveSecurity

UEFI Secure Boot: Not so secure

β€” January 16th 2025 at 15:40
ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – December 2024 edition

β€” December 27th 2024 at 10:00
From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

β€” December 19th 2024 at 10:01
ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H2 2024: Key findings

β€” December 16th 2024 at 16:57
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025
☐ β˜† βœ‡ WeLiveSecurity

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

β€” December 10th 2024 at 11:23
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?
☐ β˜† βœ‡ WeLiveSecurity

Month in security with Tony Anscombe – November 2024 edition

β€” November 29th 2024 at 12:53
Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Bootkitty marks a new chapter in the evolution of UEFI threats

β€” November 27th 2024 at 13:16
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats
☐ β˜† βœ‡ WeLiveSecurity

Firefox and Windows zero days chained to deliver the RomCom backdoor

β€” November 26th 2024 at 14:38
The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds
☐ β˜† βœ‡ WIRED

This Video Game Controller Has Become the US Military’s Weapon of Choice

By: Jared Keller β€” October 4th 2024 at 11:30
After decades of relying on buttons, switches, and toggles, the Pentagon has embraced simple, ergonomic video-game-style controllers already familiar to millions of potential recruits.
☐ β˜† βœ‡ WIRED

The Hacker Who Hunts Video Game Speedrunning Cheaters

By: Andy Greenberg β€” August 10th 2024 at 21:30
Allan β€œdwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that's stood for 15 years.
☐ β˜† βœ‡ WIRED

What a Bloody San Francisco Street Brawl Tells Us About the Age of Citizen Surveillance

By: Lauren Smiley β€” November 7th 2023 at 11:00
When a homeless man attacked a former city official, footage of the onslaught became a rallying cry. Then came another video, and anotherβ€”and the story turned inside out.
☐ β˜† βœ‡ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

β€” July 7th 2023 at 13:00
Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide
☐ β˜† βœ‡ The Hacker News

New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy

By: THN β€” August 7th 2023 at 10:14
A group of academics has devised a "deep learning-based acoustic side-channel attack" that can be used to classify laptop keystrokes that are recorded using a nearby phone with 95% accuracy. "When trained on keystrokes recorded using the video conferencing software Zoom, an accuracy of 93% was achieved, a new best for the medium," researchers Joshua Harrison, Ehsan Toreini, and Maryam Mehrnezhad
☐ β˜† βœ‡ Naked Security

Log4Shell: The Movie… a short, safe visual tour for work and home

By: Paul Ducklin β€” December 20th 2021 at 13:20
Be happy that your sysadmins are taking one (three, actually!) for the team right now... here's why!

☐ β˜† βœ‡ http://blog.trendmicro.com/feed

From Bugs to Zoombombing: How to Stay Safe in Online Meetings

By: Trend Micro β€” May 14th 2020 at 12:38

The COVID-19 pandemic, along with social distancing, has done many things to alter our lives. But in one respect it has merely accelerated a process begun many years ago. We were all spending more and more time online before the virus struck. But now, forced to work, study and socialize at home, the online digital world has become absolutely essential to our communications β€” and video conferencing apps have become our β€œface-to-face” window on the world.

The problem is that as users flock to these services, the bad guys are also lying in wait β€” to disrupt or eavesdrop on our chats, spread malware, and steal our data. Zoom’s problems have perhaps been the most widely publicized, because of its quickly rising popularity, but it’s not the only platform whose users have been potentially at risk. Cisco’s WebEx and Microsoft Teams have also had issues; while other platforms, such as Houseparty, are intrinsically less secure (almost by design for their target audience, as the name suggests).

Let’s take a look at some of the key threats out there and how you can stay safe while video conferencing.

What are the risks?

Depending on the platform (designed for work or play) and the use case (business or personal), there are various opportunities for the online attacker to join and disrupt or eavesdrop on video conferencing calls. The latter is especially dangerous if you’re discussing sensitive business information.

Malicious hackers may also look to deliver malware via chats or shared files to take control of your computer, or to steal your passwords and sensitive personal and financial information. In a business context, they could even try to hijack your video conferencing account to impersonate you, in a bid to steal info from or defraud your colleagues or company.

The bad guys may also be able to take advantage of the fact that your home PCs and devices are less well-secured than those at work or schoolβ€”and that you may be more distracted at home and less alert to potential threats.

To accomplish their goals, malicious hackers can leverage various techniques at their disposal. These can include:

  • Exploiting vulnerabilities in the video conferencing software, particularly when it hasn’t been updated to fend off the latest threats
  • Stealing your log-ins/meeting ID via malware or phishing attacks; or by obtaining a meeting ID or password shared on social media
  • Hiding malware in legitimate-looking video apps, links and files
  • Theft of sensitive data from meeting recordings stored locally or in the cloud.

Zooming in on trouble

Zoom has in many ways become the victim of its own success. With daily meeting participants soaring from 10 million in December last year to 200 million by March 2020, all eyes have been focused on the platform. Unfortunately, that also includes hackers. Zoom has been hit by a number of security and privacy issues over the past several months, which include β€œZoombombing” (meetings disrupted by uninvited guests), misleading encryption claims, a waiting room vulnerability, credential theft and data collection leaks, and fake Zoom installers. To be fair to Zoom, it has responded quickly to these issues, realigning its development priorities to fix the security and privacy issues discovered by its intensive use.

And Zoom isn’t alone. Earlier in the year, Cisco Systems had its own problem with WebEx, its widely-used enterprise video conferencing system, when it discovered a flaw in the platform that could allow a remote, unauthenticated attacker to enter a password-protected video conferencing meeting. All an attacker needed was the meeting ID and a WebEx mobile app for iOS or Android, and they could have barged in on a meeting, no authentication necessary. Cisco quickly moved to fix the high-severity vulnerability, but other flaws (also now fixed) have cropped up in WebEx’s history, including one that could enable a remote attacker to send a forged request to the system’s server.

More recently, Microsoft Teams joined the ranks of leading business videoconferencing platforms with potentially deadly vulnerabilities. On April 27 it surfaced that for at least three weeks (from the end of February till the middle of March), a malicious GIF could have stolen user data from Teams accounts, possibly across an entire company. The vulnerability was patched on April 20β€”but it’s a reminder to potential video conferencing users that even leading systems such as Zoom, WebEx, and Teams aren’t fool-proof and require periodic vulnerability and security fixes to keep them safe and secure. This is compounded during the COVID-19 pandemic when workers are working from home and connecting to their company’s network and systems via possibly unsecure home networks and devices.

Video conferencing alternatives

So how do you choose the best, most secure, video conferencing software for your work-at-home needs? There are many solutions on the market today. In fact, the choice can be dizzying. Some simply enable video or audio meetings/calls, while others also allow for sharing and saving of documents and notes. Some are only appropriate for one-on-one connections or small groups, while others can scale to thousands.

In short, you’ll need to choose the video conferencing solution most appropriate to your needs, while checking if it meets a minimum set of security standards for working at home. This set of criteria should include end-to-end encryption, automatic and frequent security updates, the use of auto-generated meeting IDs and strong access controls, a program for managing vulnerabilities, and last but not least, good privacy practices by the company.

Some video conferencing options alongside Zoom, WebEx, and Teams include:

  • Signal which is end-to-end encrypted and highly secure, but only supports one-to-one calls.
  • FaceTime, Apple’s video chat tool, is easy-to-use and end-to-end encrypted, but is only available to Mac and iOS users.
  • Jitsi Meet is a free, open-source video conferencing app that works on Android, iOS, and desktop devices, with no limit on participants beyond your bandwidth.
  • Skype Meet Now is Microsoft’s free, popular conferencing tool for up to 50 users that can be used without an account, (in contrast to Teams, which is a paid, more business-focused platform for Office 365 users).
  • Google Duo is a free option for video calls only, while the firm’s Hangouts platform can also be used for messaging. Hangouts Meet is a more business-focused paid version.
  • Doxy.me is a well-known telemedicine platform used by doctors and therapists that works through your browserβ€”so it’s up to you to keep your browser updated and to ensure the appropriate security and privacy settings are in place. Secure medical consultation with your healthcare provider is of particular concern during the shelter- and work-from-home quarantine.

How do I stay safe?

Whatever video conferencing platform you use, it’s important to bear in mind that cyber-criminals will always be looking to take advantage of any security gaps they can find β€” in the tool itself or your use of it. So how do you secure your video conferencing apps? Some tips listed here are Zoom-specific, but consider their equivalents in other platforms as general best-practice tips. Depending on the use case, you might choose to not enable some of the options here.

  • Check for end-to-end encryption before getting onboard with the app. This includes encryption for data at rest.
  • Ensure that you generate one-off meeting IDs and passwords automatically for recurring meetings (Zoom).
  • Don’t share any meeting IDs online.
  • Use the β€œwaiting room” feature in Zoom (now fixed), so the host can only allow attendees from a pre-assigned list.
  • Lock the meeting once it’s started to stop anyone new from joining.
  • Allow the host to put attendees on hold, temporarily removing them from a meeting if necessary.
  • Play a sound when someone enters or leaves the room.
  • Set screen-sharing to β€œhost only” to stop uninvited guests from sharing disruptive content.
  • Disable β€œfile transfers” to block possible malware.
  • Keep your systems patched and up-to-date so there are no bugs that hackers can target.
  • Only download conferencing apps from official iOS/Android stores and manufacturer websites.
  • Never click on links or open attachments in unsolicited mail.
  • Check the settings in your video conferencing account. Switch off camera access if you don’t want to appear on-screen.
  • Use a password manager for video conferencing app log-ins.
  • Enhance passwords with two-factor authentication (2FA) or Single-Sign-On (SSO) to protect access, if available.
  • Install anti-malware software from a reputable vendor on all devices and PCs. And implement a network security solution if you can.

How Trend Micro can help

Fortunately, Trend Micro has a range of capabilities that can support your efforts to stay safe while using video conferencing services.

Trend Micro Home Network Security (HNS) protects every device in your home connected to the internet. That means it will protect you from malicious links and attachments in phishing emails spoofed to appear as if sent from video conferencing firms, as well as from those sent by hackers that may have covertly entered a meeting. Its Vulnerability Check can identify any vulnerabilities in your home devices and PCs, including work laptops, and its Remote Access Protection can reduce the risk of tech support scams and unwanted remote connections to your device. Finally, it allows parents to control their kids’ usage of video conferencing applications, to limit their exposure.

Trend Micro Security also offers protection against email, file, and web threats on your devices. Note too, that Password Manager is automatically installed with Maximum Security to help users create unique, strong passwords for each application/website they use, including video conferencing sites.

Finally, Trend Micro WiFi Protection (multi-platform) / VPN Proxy One (Mac and iOS) offer VPN connections from your home to the internet, creating secure encrypted tunnels for traffic to flow down. The VPN apps work on both Wi-Fi and Ethernet connections. This could be useful for users concerned their video conferencing app isn’t end-to-end encrypted, or for those wishing to protect their identity and personal information when interacting on these apps.

The post From Bugs to Zoombombing: How to Stay Safe in Online Meetings appeared first on .

❌